Article
Physics, Multidisciplinary
Na Li
Summary: In the cloud, uploading encrypted data is effective in preventing data leakage, but data access control remains a problem. A new authorization mechanism called PKEET-FA is introduced to restrict the comparison of ciphertexts between users. IBEET-FA combines identity-based encryption with flexible authorization, and a new and efficient IBEET-FA scheme is proposed using general trapdoor discrete log groups.
Article
Computer Science, Information Systems
Xi-Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
Summary: PKEET-FA is a critical cryptographic primitive for protecting outsourced data in cloud-based email systems. It offers more efficient equality tests and supports flexible authorization policies, making it more flexible than previous proposals.
COMPUTER COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Siyue Dong, Zhen Zhao, Baocang Wang, Wen Gao, Shanshan Zhang
Summary: This research proposes a concept of certificateless encryption supporting multi-ciphertext equality test, which addresses the key escrow problem. The scheme enhances security and reduces computational overhead by incorporating proxy-assisted authorization.
Article
Computer Science, Information Systems
Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen
Summary: This article introduces a new encryption scheme PKEET-FDA, where users can adaptively authorize multiple testers to test their ciphertexts, avoiding the issue of repeatedly encrypting messages while ensuring data security.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Mohammed Ramadan, Zhiguang Qin
Summary: In this paper, a secure and efficient public-key encryption with an equality test technique (PKEET-AA) that supports anonymous authorization is proposed. This scheme allows specific users to perform equality tests without compromising sensitive information and provides statistical information search. The security of the scheme is proven against chosen-ciphertext attack (OW-CCA) and adaptive chosen ciphertext attack (IND-CCA) in the random oracle model.
Article
Computer Science, Information Systems
Xiaoying Shen, Baocang Wang, Licheng Wang, Pu Duan, Benyu Zhang
Summary: In this paper, we propose an efficient and verifiable group public key encryption scheme with equality test, GPKEET/BP, that does not require bilinear pairings. Experimental results show that the test algorithm of our scheme is about 92% faster than the existing scheme by Ling et al., making our GPKEET/BP scheme better suited for group ciphertext equality test situations.
INFORMATION SCIENCES
(2022)
Article
Automation & Control Systems
Tung-Tso Tsai, Han-Yu Lin, Han-Ching Tsai
Summary: Traditional public key cryptography requires certificates to link user identity and public key, but building a public key infrastructure is resource-intensive and complex. Certificateless public key encryption (CL-PKC) eliminates the need for certificates, and the certificateless public key encryption with equality test (CL-PKEET) mechanism is suitable for cloud applications, providing confidentiality of private data and equality testing of ciphertext. The proposed article introduces RCL-PKEET, the first revocable CL-PKEET scheme, which effectively removes illegal users while maintaining the effectiveness of existing CL-PKEET schemes. The security of the proposed scheme is formally demonstrated under the bilinear Diffie-Hellman assumption.
INFORMATION TECHNOLOGY AND CONTROL
(2022)
Article
Computer Science, Information Systems
Meng Zhao, Yong Ding, Shijie Tang, Hai Liang, Changsong Yang, Huiyong Wang
Summary: This paper proposes a dual-server certificateless public key encryption scheme supporting authorized equality test (DS-CL-AET) in bilinear groups to address the security issues in securing outsourced IoT data in clouds.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang
Summary: Cloud medical treatment provides a practical method for creating, collecting and managing patients' personal health records (PHR) through real-time data sharing. However, the challenge lies in securely storing and processing massive amounts of PHR data in a public cloud environment. This paper proposes a novel solution to address the issues of privacy exposure, data security, and flexible access in medical systems.
Article
Computer Science, Information Systems
Wenjie Yang, Shangpeng Wang, Yi Mu
Summary: Gayathri et al.'s CLAS scheme has security vulnerabilities, allowing forgeries and potential denial of valid aggregate signatures. We propose a secure alternative scheme with aggregation algorithm to mitigate internal attacks.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Theory & Methods
Xi-Jun Lin, Qihui Wang, Lin Sun, Haipeng Qu
Summary: This paper introduces a new primitive called identity-based encryption with equality test and datestamp-based authorization mechanism (IBEET-DBA), which allows data owners to control the validity of trapdoors by embedding datestamps, ensuring that cloud servers can only obtain correct equivalence results on ciphertexts within the valid period.
THEORETICAL COMPUTER SCIENCE
(2021)
Article
Computer Science, Information Systems
Lunzhi Deng, Yixian Yang, Ronghai Gao
Summary: The growing demand for healthcare and the lack of medical staff is a pressing issue that can be addressed by healthcare wireless sensor technology. This technology allows patients to collect health data with wearable devices and send it to doctors for diagnosis, overcoming traditional medical limitations. Protecting data security and patient privacy is crucial for healthcare wireless sensor networks, with the new certificateless designated verifier anonymous aggregate signature (CL-DVAAS) scheme showing computational efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Hao Lin, Zhen Zhao, Fei Gao, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi
Summary: Public key encryption with equality test (PKEET) allows checking if two ciphertexts come from the same message without decryption, enhancing data security in cloud storage. Traditional PKEET authorization has limitations, leading to the proposal of PKEET-PA with constant-size trapdoor for more efficient and secure data authentication in receivers' computation.
Article
Computer Science, Artificial Intelligence
Hui Tian, Weiping Ye, Jia Wang, Hanyu Quan, Chin-Chen Chang
Summary: In the context of healthcare 4.0, a novel certificateless public auditing for medical data in the cloud (CPAMD) is proposed to ensure the integrity of remotely stored medical data. It achieves efficient batch auditing without complicated certificate management and key escrow through the use of secure certificateless signatures, manageable delegated data outsourcing, and privacy-preserving augmented verification. Security analysis and performance evaluation demonstrate that CPAMD provides better auditing security and capabilities while achieving comparable performance to state-of-the-art methods.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2023)
Article
Computer Science, Hardware & Architecture
Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang
Summary: This paper introduces public key encryption with equality test (PKEET) and identity-based encryption with equality test (IBEET) to address the problem of determining whether two ciphertexts contain the same message encrypted with different public keys, without decryption. The proposed IBEET scheme resists offline message recovery attacks (OMRA) and does not require the dual-tester setting or group mechanism. Security is demonstrated through mathematical assumptions, and experiment results show the efficiency of the scheme. From a usability perspective, the paper explains why the scheme is more suitable for healthcare social Apps compared to other OMRA-resistant schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Artificial Intelligence
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li
Summary: The study proposed a Secure Mobile Health System (SMHS) that supports search function and decryption verification using online/offline attribute-based encryption, providing secure Electronic Health Records (EHRs) and efficient searching over the health cloud. Additionally, the scheme was proven in the standard model and shown to significantly reduce computation costs in the mobile health system through experimental results compared to existing protocols.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Ahmed Elkhalil, Jiashu Zhang, Rashad Elhabob, Nabeil Eltayieb
Summary: The rapid development of Internet of Vehicles has led to an increase in connected vehicles, requiring secure communication protocols like HSC-IoV to ensure confidentiality, key revocation, integrity, authentication, and non-repudiation for efficient communication without pairing.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Computer Science, Artificial Intelligence
Abdelrhman Hassan, Fei Liu, Fanchuan Wang, Yong Wang
Summary: The Internet-of-Things (IoT) are widely used in daily life for purposes such as image data collection, traffic monitoring, and road condition prediction. However, security issues remain a challenge for deploying these smart IoT devices and applications.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
(2021)
Article
Telecommunications
Negalign Wake Hundera, Chuanjie Jin, Muhammad Umar Aftab, Dagmawit Mesfin, Sachin Kumar
Summary: The rapid growth of Internet of Vehicles (IoV) generates a large network that gathers data from vehicles and utilizes cloud computing for authorized access, but privacy and authorized access of data stored in the cloud are primary concerns. To address these issues, attribute-based signcryption (ABSC) provides confidentiality, authenticity, and sender secrecy for data stored in the cloud.
ANNALS OF TELECOMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Ahmed Elkhalil, Jiashu Zhang, Rashad Elhabob
Summary: The proposed Online/Offline signcryption scheme based on blockchain aims to secure data sharing between Internet of Vehicles (IoV) and internet servers by addressing security issues. The protocol satisfies the security requirements of IoV and reduces computational cost and energy consumption significantly.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Abdelrhman Hassan, Fei Liu, Fanchuan Wang, Yong Wang
Summary: With the increasing popularity of CBIR and the outsourcing of image retrieval to the cloud, a secure CBIR framework is proposed and implemented in this paper. It utilizes a pre-trained DNN model to extract image feature vectors and employs homomorphic encryption and 2-PC techniques to protect user privacy during image retrieval on the cloud. The framework also includes secure image similarity scoring and result sorting protocols, showcasing its efficiency, accuracy, and security.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Computer Science, Information Systems
Negalign Wake Hundera, Chuanjie Jin, Dagmawit Mesfin Geressu, Muhammad Umar Aftab, Oluwasanmi Ariyo Olanrewaju, Hu Xiong
Summary: Advancements in technology and wireless sensors are leading to the Internet of Things, where large amounts of data are collected and processed through cloud servers. Establishing a secure network is crucial for data integrity, and our proposed proxy-based public-key cryptosystem aims to ensure secure and efficient cloud data sharing in IoT environments. The scheme is proven to be secure and reduces computational and communication costs for both senders and receivers.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Telecommunications
Abdelrhman Hassan, Rashad Elhabob, Nabeil Eltayieb, Yong Wang
Summary: This article proposed an Authorized Equality Test on Identity-Based Cryptosystem (AET-IBC) scheme to address the problem of providing search functionality on encrypted data in mobile social networking applications. The scheme is highly secure and supports different authorization methods.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2021)
Article
Computer Science, Information Systems
Nabeil Eltayieb, Rashad Elhabob, Muhammad Umar Aftab, Ramil Kuleev, Manuel Mazzara, Muhammad Ahmad
Summary: This paper proposes an authentication protocol with a full aggregation signature to secure smart city applications. By using a certificate-less aggregate signature (CLAS), message authentication, user anonymity, constant signature size, unlinkability, and resistance to replay attacks can be achieved. Performance evaluation results show that the proposed CLAS performs better than existing relevant schemes.
COMPUTER COMMUNICATIONS
(2022)
Article
Multidisciplinary Sciences
Addis Abebe Assefa, Wenhong Tian, Negalign Wake Hundera, Muhammad Umar Aftab
Summary: Estimating crowd density is essential for various applications, and models with strong symmetry show promising results. However, challenges arise from dynamic scenes with perspective distortions and the difficulty of incorporating features of objects of varying sizes into prediction models. To address this, a framework utilizing a parallel multi-size receptive field units is proposed to improve estimation accuracy by leveraging features from different layers of a CNN model.
Article
Multidisciplinary Sciences
Habte Lejebo Leka, Zhang Fengli, Ayantu Tesfaye Kenea, Negalign Wake Hundera, Tewodros Gizaw Tohye, Abebe Tamrat Tegene
Summary: To meet increasing demand, a cloud system should optimize its available resources and consider the symmetrical issue of high and low oscillations in cloud workload. A proposed particle swarm optimization (PSO)-based ensemble meta-learning workload forecasting approach utilizes base models and their network inputs with PSO-optimized weights. The model employs a blended ensemble learning strategy with three recurrent neural networks (RNNs) and a dense neural network layer, and is evaluated using CPU utilization data from GWA-T-12 and PlanetLab traces, comparing its performance in terms of RMSE to LSTM, GRU, and BiLSTM sub-models.